Mesnevi-i Manevi Security & Risk Analysis

wordpress.org/plugins/mesnevi-i-manevi

Mevlânâ Celâleddin Rumî'nin altı ciltlik Farsça eseri, Mesnevî-i Manevî'den seçme beyitleri Türkçe olarak gösteren bir eklenti.

10 active installs v1.1 PHP + WP + Updated Aug 27, 2010
celaleddinmanevimesnevimevlanarumi
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Mesnevi-i Manevi Safe to Use in 2026?

Generally Safe

Score 85/100

Mesnevi-i Manevi has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 15yr ago
Risk Assessment

The mesnevi-i-manevi plugin v1.1 exhibits a generally good security posture based on the provided static analysis data. It boasts a complete absence of AJAX handlers, REST API routes, shortcodes, and cron events, resulting in a zero attack surface. Furthermore, the code signals indicate no dangerous functions, file operations, external HTTP requests, or the use of bundled libraries, all of which are positive security indicators. The plugin also demonstrates a commitment to secure data handling with 100% of its SQL queries using prepared statements, and the taint analysis shows no critical or high-severity flows. Its vulnerability history is also clear, with no recorded CVEs, further bolstering confidence in its current security state.

However, a significant concern arises from the complete lack of output escaping for all four identified outputs. This presents a substantial risk of Cross-Site Scripting (XSS) vulnerabilities, as untrusted data displayed to users is not being properly sanitized. Additionally, the absence of nonce and capability checks, while not directly exposed by the limited attack surface, indicates a potential weakness in broader security practices. If new entry points were to be introduced in future versions without these checks, the plugin would be immediately vulnerable to various attacks.

In conclusion, while the plugin has a strong foundation and a clean history, the unescaped output is a critical flaw that must be addressed. The lack of nonce and capability checks, though not currently exploitable, represents an area for improvement to ensure robust security moving forward. Prioritizing the implementation of output escaping should be the immediate focus for improving the plugin's security.

Key Concerns

  • Unescaped output found
  • No nonce checks implemented
  • No capability checks implemented
Vulnerabilities
None known

Mesnevi-i Manevi Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Mesnevi-i Manevi Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
4
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped4 total outputs
Attack Surface

Mesnevi-i Manevi Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actionplugins_loadedmesnevi-i-manevi.php:829
filterthe_contentmesnevi-i-manevi.php:849
Maintenance & Trust

Mesnevi-i Manevi Maintenance & Trust

Maintenance Signals

WordPress version tested
Last updatedAug 27, 2010
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Alternatives

Mesnevi-i Manevi Alternatives

No alternatives data available yet.

Developer Profile

Mesnevi-i Manevi Developer Profile

sustun

8 plugins · 90 total installs

86
trust score
Avg Security Score
89/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Mesnevi-i Manevi

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Mesnevi-i Manevi